We present a game-theoretic model of bargaining over a metaphor in the context of political communication, find its equilibrium, and use it to rationalize observed linguistic beha...
k-times anonymous authentication (k-TAA) schemes allow members of a group to be anonymously authenticated by application providers for a bounded number of times. k-TAA has applicat...
Over the past few years, remarkable increase has occurred in the demand for 3D models for cultural heritage applications. The techniques employed have evolved from surveying and C...
Sabry F. El-Hakim, J.-Angelo Beraldin, Michel Pica...
In this paper we present an approach to enrich skeleton-driven animations with physically-based secondary deformation in real time. To achieve this goal, we propose a novel, surfa...
Xiaohan Shi, Kun Zhou, Yiying Tong, Mathieu Desbru...
Poker is an interesting test-bed for artificial intelligence research. It is a game of imperfect knowledge, where multiple competing agents must deal with risk management, agent m...
Darse Billings, Denis Papp, Jonathan Schaeffer, Du...